Rise Pest Control is looking for a full time sub contractor to become part of our team in the Pretoria every job completed – Must be qualified (Pest Control Operator Certificate; P number) – Must have valid record – Sober habits – Hard working The post Pest Control Sub Contractor Needed in Pretoria appeared first
Rise Pest Control is looking for a full time sub contractor to become part of our team in the JHB area every job completed – Must be qualified (Pest Control Operator Certificate; P number) – Must have valid record – Sober habits – Hard working The post Pest Control Sub Contractor Needed in Johannesburg appeared
Credit Controller – Johannesburg South – R27 000 Full Credit Control function. Syspro. Manage the Companies manufacturing /production environment. The post Credit Controller – Johannesburg South – R27 000 appeared first
BBL Security Products, a security wholesaler based in Brooklyn Cape Town, is looking to employ a full full time Debtors Clerk / Credit Controller to join our team and play a pivotal role in our administration national level. General Administration Credit Control Collections Account Reconciliation Bank Statement proprietors Proven experience in debtors / credit control / collections Proven experience in account reconciliation
marketing coordination, financial management, and security. This role requires a proactive individual with to control costs and optimise profitability. Security Management: Implement and maintain security protocols safeguard the store's assets. Conduct regular security assessments and address any vulnerabilities. In Knowledge of stock management principles and inventory control systems. Familiarity with marketing concepts and adapt to changing priorities. Prior experience in security management is advantageous. Bachelor's degree
marketing coordination, financial management, and security. This role requires a proactive individual with to control costs and optimise profitability. Security Management: Implement and maintain security protocols safeguard the store's assets. Conduct regular security assessments and address any vulnerabilities. In Knowledge of stock management principles and inventory control systems. Familiarity with marketing concepts and adapt to changing priorities. Prior experience in security management is advantageous. Bachelor's degree
marketing coordination, financial management, and security. This role requires a proactive individual with to control costs and optimise profitability. Security Management: Implement and maintain security protocols safeguard the store's assets. Conduct regular security assessments and address any vulnerabilities. In Knowledge of stock management principles and inventory control systems. Familiarity with marketing concepts and adapt to changing priorities. Prior experience in security management is advantageous. Bachelor's degree
marketing coordination, financial management, and security. This role requires a proactive individual with to control costs and optimise profitability. Security Management: Implement and maintain security protocols safeguard the store's assets. Conduct regular security assessments and address any vulnerabilities. In Knowledge of stock management principles and inventory control systems. Familiarity with marketing concepts and adapt to changing priorities. Prior experience in security management is advantageous. Bachelor's degree
implementation of an organisation-wide information security strategy aligned with the business objectives towards establishing and maintaining information security policies, procedures, standards, and guidelines identification, assessment and management of information security risks across the organisation, including data third-party relationships. Promotes a culture of security awareness among employees through training, education address and mitigate security incidents. Ensures compliance with relevant security regulations, laws, and
implementation of an organisation-wide information security strategy aligned with the business objectives towards establishing and maintaining information security policies, procedures, standards, and guidelines identification, assessment and management of information security risks across the organisation, including data third-party relationships.